1. Packages
  2. Zscaler Internet Access (ZIA)
  3. API Docs
  4. AdminUsers
Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler

zia.AdminUsers

Explore with Pulumi AI

zia logo
Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler

    The zia_admin_users resource allows the creation and management of ZIA admin user account created in the Zscaler Internet Access cloud or via the API.

    Example Usage

    Organization Scope

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const superAdmin = zia.getAdminRoles({
        name: "Super Admin",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    const johnSmith = new zia.AdminUsers("johnSmith", {
        loginName: "john.smith@acme.com",
        userName: "John Smith",
        email: "john.smith@acme.com",
        isPasswordLoginAllowed: true,
        password: "*********************",
        isSecurityReportCommEnabled: true,
        isServiceUpdateCommEnabled: true,
        isProductUpdateCommEnabled: true,
        comments: "Administrator User",
        roles: [{
            id: superAdmin.then(superAdmin => superAdmin.id),
        }],
        adminScopeType: "ORGANIZATION",
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    super_admin = zia.get_admin_roles(name="Super Admin")
    ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    john_smith = zia.AdminUsers("johnSmith",
        login_name="john.smith@acme.com",
        user_name="John Smith",
        email="john.smith@acme.com",
        is_password_login_allowed=True,
        password="*********************",
        is_security_report_comm_enabled=True,
        is_service_update_comm_enabled=True,
        is_product_update_comm_enabled=True,
        comments="Administrator User",
        roles=[zia.AdminUsersRoleArgs(
            id=super_admin.id,
        )],
        admin_scope_type="ORGANIZATION")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
    			Name: pulumi.StringRef("Super Admin"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
    			LoginName:                   pulumi.String("john.smith@acme.com"),
    			UserName:                    pulumi.String("John Smith"),
    			Email:                       pulumi.String("john.smith@acme.com"),
    			IsPasswordLoginAllowed:      pulumi.Bool(true),
    			Password:                    pulumi.String("*********************"),
    			IsSecurityReportCommEnabled: pulumi.Bool(true),
    			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
    			IsProductUpdateCommEnabled:  pulumi.Bool(true),
    			Comments:                    pulumi.String("Administrator User"),
    			Roles: zia.AdminUsersRoleArray{
    				&zia.AdminUsersRoleArgs{
    					Id: pulumi.Int(superAdmin.Id),
    				},
    			},
    			AdminScopeType: pulumi.String("ORGANIZATION"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var superAdmin = Zia.GetAdminRoles.Invoke(new()
        {
            Name = "Super Admin",
        });
    
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new Zia.AdminUsers("johnSmith", new()
        {
            LoginName = "john.smith@acme.com",
            UserName = "John Smith",
            Email = "john.smith@acme.com",
            IsPasswordLoginAllowed = true,
            Password = "*********************",
            IsSecurityReportCommEnabled = true,
            IsServiceUpdateCommEnabled = true,
            IsProductUpdateCommEnabled = true,
            Comments = "Administrator User",
            Roles = new[]
            {
                new Zia.Inputs.AdminUsersRoleArgs
                {
                    Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
                },
            },
            AdminScopeType = "ORGANIZATION",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetAdminRolesArgs;
    import com.pulumi.zia.AdminUsers;
    import com.pulumi.zia.AdminUsersArgs;
    import com.pulumi.zia.inputs.AdminUsersRoleArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
                .name("Super Admin")
                .build());
    
            //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
            var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
                .loginName("john.smith@acme.com")
                .userName("John Smith")
                .email("john.smith@acme.com")
                .isPasswordLoginAllowed(true)
                .password("*********************")
                .isSecurityReportCommEnabled(true)
                .isServiceUpdateCommEnabled(true)
                .isProductUpdateCommEnabled(true)
                .comments("Administrator User")
                .roles(AdminUsersRoleArgs.builder()
                    .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                    .build())
                .adminScopeType("ORGANIZATION")
                .build());
    
        }
    }
    
    resources:
      ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
      johnSmith:
        type: zia:AdminUsers
        properties:
          loginName: john.smith@acme.com
          userName: John Smith
          email: john.smith@acme.com
          isPasswordLoginAllowed: true
          password: '*********************'
          isSecurityReportCommEnabled: true
          isServiceUpdateCommEnabled: true
          isProductUpdateCommEnabled: true
          comments: Administrator User
          roles:
            - id: ${superAdmin.id}
          adminScopeType: ORGANIZATION
    variables:
      superAdmin:
        fn::invoke:
          Function: zia:getAdminRoles
          Arguments:
            name: Super Admin
    

    Department Scope

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const superAdmin = zia.getAdminRoles({
        name: "Super Admin",
    });
    const engineering = zia.getDepartmentManagement({
        name: "Engineering",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    const johnSmith = new zia.AdminUsers("johnSmith", {
        loginName: "john.smith@acme.com",
        userName: "John Smith",
        email: "john.smith@acme.com",
        isPasswordLoginAllowed: true,
        password: "*********************",
        isSecurityReportCommEnabled: true,
        isServiceUpdateCommEnabled: true,
        isProductUpdateCommEnabled: true,
        comments: "Administrator User",
        roles: [{
            id: superAdmin.then(superAdmin => superAdmin.id),
        }],
        adminScopeType: "DEPARTMENT",
        adminScopeEntities: {
            ids: [
                engineering.then(engineering => engineering.id),
                data.zia_department_management.sales.id,
            ],
        },
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    super_admin = zia.get_admin_roles(name="Super Admin")
    engineering = zia.get_department_management(name="Engineering")
    ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    john_smith = zia.AdminUsers("johnSmith",
        login_name="john.smith@acme.com",
        user_name="John Smith",
        email="john.smith@acme.com",
        is_password_login_allowed=True,
        password="*********************",
        is_security_report_comm_enabled=True,
        is_service_update_comm_enabled=True,
        is_product_update_comm_enabled=True,
        comments="Administrator User",
        roles=[zia.AdminUsersRoleArgs(
            id=super_admin.id,
        )],
        admin_scope_type="DEPARTMENT",
        admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
            ids=[
                engineering.id,
                data["zia_department_management"]["sales"]["id"],
            ],
        ))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
    			Name: pulumi.StringRef("Super Admin"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		engineering, err := zia.GetDepartmentManagement(ctx, &zia.GetDepartmentManagementArgs{
    			Name: pulumi.StringRef("Engineering"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
    			LoginName:                   pulumi.String("john.smith@acme.com"),
    			UserName:                    pulumi.String("John Smith"),
    			Email:                       pulumi.String("john.smith@acme.com"),
    			IsPasswordLoginAllowed:      pulumi.Bool(true),
    			Password:                    pulumi.String("*********************"),
    			IsSecurityReportCommEnabled: pulumi.Bool(true),
    			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
    			IsProductUpdateCommEnabled:  pulumi.Bool(true),
    			Comments:                    pulumi.String("Administrator User"),
    			Roles: zia.AdminUsersRoleArray{
    				&zia.AdminUsersRoleArgs{
    					Id: pulumi.Int(superAdmin.Id),
    				},
    			},
    			AdminScopeType: pulumi.String("DEPARTMENT"),
    			AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(engineering.Id),
    					data.Zia_department_management.Sales.Id,
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var superAdmin = Zia.GetAdminRoles.Invoke(new()
        {
            Name = "Super Admin",
        });
    
        var engineering = Zia.GetDepartmentManagement.Invoke(new()
        {
            Name = "Engineering",
        });
    
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new Zia.AdminUsers("johnSmith", new()
        {
            LoginName = "john.smith@acme.com",
            UserName = "John Smith",
            Email = "john.smith@acme.com",
            IsPasswordLoginAllowed = true,
            Password = "*********************",
            IsSecurityReportCommEnabled = true,
            IsServiceUpdateCommEnabled = true,
            IsProductUpdateCommEnabled = true,
            Comments = "Administrator User",
            Roles = new[]
            {
                new Zia.Inputs.AdminUsersRoleArgs
                {
                    Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
                },
            },
            AdminScopeType = "DEPARTMENT",
            AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
            {
                Ids = new[]
                {
                    engineering.Apply(getDepartmentManagementResult => getDepartmentManagementResult.Id),
                    data.Zia_department_management.Sales.Id,
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetAdminRolesArgs;
    import com.pulumi.zia.inputs.GetDepartmentManagementArgs;
    import com.pulumi.zia.AdminUsers;
    import com.pulumi.zia.AdminUsersArgs;
    import com.pulumi.zia.inputs.AdminUsersRoleArgs;
    import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
                .name("Super Admin")
                .build());
    
            final var engineering = ZiaFunctions.getDepartmentManagement(GetDepartmentManagementArgs.builder()
                .name("Engineering")
                .build());
    
            //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
            var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
                .loginName("john.smith@acme.com")
                .userName("John Smith")
                .email("john.smith@acme.com")
                .isPasswordLoginAllowed(true)
                .password("*********************")
                .isSecurityReportCommEnabled(true)
                .isServiceUpdateCommEnabled(true)
                .isProductUpdateCommEnabled(true)
                .comments("Administrator User")
                .roles(AdminUsersRoleArgs.builder()
                    .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                    .build())
                .adminScopeType("DEPARTMENT")
                .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
                    .ids(                
                        engineering.applyValue(getDepartmentManagementResult -> getDepartmentManagementResult.id()),
                        data.zia_department_management().sales().id())
                    .build())
                .build());
    
        }
    }
    
    resources:
      ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
      johnSmith:
        type: zia:AdminUsers
        properties:
          loginName: john.smith@acme.com
          userName: John Smith
          email: john.smith@acme.com
          isPasswordLoginAllowed: true
          password: '*********************'
          isSecurityReportCommEnabled: true
          isServiceUpdateCommEnabled: true
          isProductUpdateCommEnabled: true
          comments: Administrator User
          roles:
            - id: ${superAdmin.id}
          adminScopeType: DEPARTMENT
          adminScopeEntities:
            ids:
              - ${engineering.id}
              - ${data.zia_department_management.sales.id}
    variables:
      superAdmin:
        fn::invoke:
          Function: zia:getAdminRoles
          Arguments:
            name: Super Admin
      engineering:
        fn::invoke:
          Function: zia:getDepartmentManagement
          Arguments:
            name: Engineering
    

    Location Scope

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const superAdmin = zia.getAdminRoles({
        name: "Super Admin",
    });
    const auSydneyBranch01 = zia.getLocationManagement({
        name: "AU - Sydney - Branch01",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    const johnSmith = new zia.AdminUsers("johnSmith", {
        loginName: "john.smith@acme.com",
        userName: "John Smith",
        email: "john.smith@acme.com",
        isPasswordLoginAllowed: true,
        password: "*********************",
        isSecurityReportCommEnabled: true,
        isServiceUpdateCommEnabled: true,
        isProductUpdateCommEnabled: true,
        comments: "Administrator User",
        roles: [{
            id: superAdmin.then(superAdmin => superAdmin.id),
        }],
        adminScopeType: "LOCATION",
        adminScopeEntities: {
            ids: [auSydneyBranch01.then(auSydneyBranch01 => auSydneyBranch01.id)],
        },
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    super_admin = zia.get_admin_roles(name="Super Admin")
    au_sydney_branch01 = zia.get_location_management(name="AU - Sydney - Branch01")
    ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    john_smith = zia.AdminUsers("johnSmith",
        login_name="john.smith@acme.com",
        user_name="John Smith",
        email="john.smith@acme.com",
        is_password_login_allowed=True,
        password="*********************",
        is_security_report_comm_enabled=True,
        is_service_update_comm_enabled=True,
        is_product_update_comm_enabled=True,
        comments="Administrator User",
        roles=[zia.AdminUsersRoleArgs(
            id=super_admin.id,
        )],
        admin_scope_type="LOCATION",
        admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
            ids=[au_sydney_branch01.id],
        ))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
    			Name: pulumi.StringRef("Super Admin"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		auSydneyBranch01, err := zia.LookupLocationManagement(ctx, &zia.LookupLocationManagementArgs{
    			Name: pulumi.StringRef("AU - Sydney - Branch01"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
    			LoginName:                   pulumi.String("john.smith@acme.com"),
    			UserName:                    pulumi.String("John Smith"),
    			Email:                       pulumi.String("john.smith@acme.com"),
    			IsPasswordLoginAllowed:      pulumi.Bool(true),
    			Password:                    pulumi.String("*********************"),
    			IsSecurityReportCommEnabled: pulumi.Bool(true),
    			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
    			IsProductUpdateCommEnabled:  pulumi.Bool(true),
    			Comments:                    pulumi.String("Administrator User"),
    			Roles: zia.AdminUsersRoleArray{
    				&zia.AdminUsersRoleArgs{
    					Id: pulumi.Int(superAdmin.Id),
    				},
    			},
    			AdminScopeType: pulumi.String("LOCATION"),
    			AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(auSydneyBranch01.Id),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var superAdmin = Zia.GetAdminRoles.Invoke(new()
        {
            Name = "Super Admin",
        });
    
        var auSydneyBranch01 = Zia.GetLocationManagement.Invoke(new()
        {
            Name = "AU - Sydney - Branch01",
        });
    
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new Zia.AdminUsers("johnSmith", new()
        {
            LoginName = "john.smith@acme.com",
            UserName = "John Smith",
            Email = "john.smith@acme.com",
            IsPasswordLoginAllowed = true,
            Password = "*********************",
            IsSecurityReportCommEnabled = true,
            IsServiceUpdateCommEnabled = true,
            IsProductUpdateCommEnabled = true,
            Comments = "Administrator User",
            Roles = new[]
            {
                new Zia.Inputs.AdminUsersRoleArgs
                {
                    Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
                },
            },
            AdminScopeType = "LOCATION",
            AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
            {
                Ids = new[]
                {
                    auSydneyBranch01.Apply(getLocationManagementResult => getLocationManagementResult.Id),
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetAdminRolesArgs;
    import com.pulumi.zia.inputs.GetLocationManagementArgs;
    import com.pulumi.zia.AdminUsers;
    import com.pulumi.zia.AdminUsersArgs;
    import com.pulumi.zia.inputs.AdminUsersRoleArgs;
    import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
                .name("Super Admin")
                .build());
    
            final var auSydneyBranch01 = ZiaFunctions.getLocationManagement(GetLocationManagementArgs.builder()
                .name("AU - Sydney - Branch01")
                .build());
    
            //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
            var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
                .loginName("john.smith@acme.com")
                .userName("John Smith")
                .email("john.smith@acme.com")
                .isPasswordLoginAllowed(true)
                .password("*********************")
                .isSecurityReportCommEnabled(true)
                .isServiceUpdateCommEnabled(true)
                .isProductUpdateCommEnabled(true)
                .comments("Administrator User")
                .roles(AdminUsersRoleArgs.builder()
                    .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                    .build())
                .adminScopeType("LOCATION")
                .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
                    .ids(auSydneyBranch01.applyValue(getLocationManagementResult -> getLocationManagementResult.id()))
                    .build())
                .build());
    
        }
    }
    
    resources:
      ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
      johnSmith:
        type: zia:AdminUsers
        properties:
          loginName: john.smith@acme.com
          userName: John Smith
          email: john.smith@acme.com
          isPasswordLoginAllowed: true
          password: '*********************'
          isSecurityReportCommEnabled: true
          isServiceUpdateCommEnabled: true
          isProductUpdateCommEnabled: true
          comments: Administrator User
          roles:
            - id: ${superAdmin.id}
          adminScopeType: LOCATION
          adminScopeEntities:
            ids:
              - ${auSydneyBranch01.id}
    variables:
      superAdmin:
        fn::invoke:
          Function: zia:getAdminRoles
          Arguments:
            name: Super Admin
      auSydneyBranch01:
        fn::invoke:
          Function: zia:getLocationManagement
          Arguments:
            name: AU - Sydney - Branch01
    

    Location Group Scope

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const superAdmin = zia.getAdminRoles({
        name: "Super Admin",
    });
    const corporateUserTrafficGroup = zia.getLocationGroups({
        name: "Corporate User Traffic Group",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    const johnSmith = new zia.AdminUsers("johnSmith", {
        loginName: "john.smith@acme.com",
        userName: "John Smith",
        email: "john.smith@acme.com",
        isPasswordLoginAllowed: true,
        password: "*********************",
        isSecurityReportCommEnabled: true,
        isServiceUpdateCommEnabled: true,
        isProductUpdateCommEnabled: true,
        comments: "Administrator User",
        roles: [{
            id: superAdmin.then(superAdmin => superAdmin.id),
        }],
        adminScopeType: "LOCATION_GROUP",
        adminScopeEntities: {
            ids: [corporateUserTrafficGroup.then(corporateUserTrafficGroup => corporateUserTrafficGroup.id)],
        },
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    super_admin = zia.get_admin_roles(name="Super Admin")
    corporate_user_traffic_group = zia.get_location_groups(name="Corporate User Traffic Group")
    ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    john_smith = zia.AdminUsers("johnSmith",
        login_name="john.smith@acme.com",
        user_name="John Smith",
        email="john.smith@acme.com",
        is_password_login_allowed=True,
        password="*********************",
        is_security_report_comm_enabled=True,
        is_service_update_comm_enabled=True,
        is_product_update_comm_enabled=True,
        comments="Administrator User",
        roles=[zia.AdminUsersRoleArgs(
            id=super_admin.id,
        )],
        admin_scope_type="LOCATION_GROUP",
        admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
            ids=[corporate_user_traffic_group.id],
        ))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
    			Name: pulumi.StringRef("Super Admin"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		corporateUserTrafficGroup, err := zia.GetLocationGroups(ctx, &zia.GetLocationGroupsArgs{
    			Name: pulumi.StringRef("Corporate User Traffic Group"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
    			LoginName:                   pulumi.String("john.smith@acme.com"),
    			UserName:                    pulumi.String("John Smith"),
    			Email:                       pulumi.String("john.smith@acme.com"),
    			IsPasswordLoginAllowed:      pulumi.Bool(true),
    			Password:                    pulumi.String("*********************"),
    			IsSecurityReportCommEnabled: pulumi.Bool(true),
    			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
    			IsProductUpdateCommEnabled:  pulumi.Bool(true),
    			Comments:                    pulumi.String("Administrator User"),
    			Roles: zia.AdminUsersRoleArray{
    				&zia.AdminUsersRoleArgs{
    					Id: pulumi.Int(superAdmin.Id),
    				},
    			},
    			AdminScopeType: pulumi.String("LOCATION_GROUP"),
    			AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(corporateUserTrafficGroup.Id),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var superAdmin = Zia.GetAdminRoles.Invoke(new()
        {
            Name = "Super Admin",
        });
    
        var corporateUserTrafficGroup = Zia.GetLocationGroups.Invoke(new()
        {
            Name = "Corporate User Traffic Group",
        });
    
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new Zia.AdminUsers("johnSmith", new()
        {
            LoginName = "john.smith@acme.com",
            UserName = "John Smith",
            Email = "john.smith@acme.com",
            IsPasswordLoginAllowed = true,
            Password = "*********************",
            IsSecurityReportCommEnabled = true,
            IsServiceUpdateCommEnabled = true,
            IsProductUpdateCommEnabled = true,
            Comments = "Administrator User",
            Roles = new[]
            {
                new Zia.Inputs.AdminUsersRoleArgs
                {
                    Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
                },
            },
            AdminScopeType = "LOCATION_GROUP",
            AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
            {
                Ids = new[]
                {
                    corporateUserTrafficGroup.Apply(getLocationGroupsResult => getLocationGroupsResult.Id),
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetAdminRolesArgs;
    import com.pulumi.zia.inputs.GetLocationGroupsArgs;
    import com.pulumi.zia.AdminUsers;
    import com.pulumi.zia.AdminUsersArgs;
    import com.pulumi.zia.inputs.AdminUsersRoleArgs;
    import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
                .name("Super Admin")
                .build());
    
            final var corporateUserTrafficGroup = ZiaFunctions.getLocationGroups(GetLocationGroupsArgs.builder()
                .name("Corporate User Traffic Group")
                .build());
    
            //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
            var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
                .loginName("john.smith@acme.com")
                .userName("John Smith")
                .email("john.smith@acme.com")
                .isPasswordLoginAllowed(true)
                .password("*********************")
                .isSecurityReportCommEnabled(true)
                .isServiceUpdateCommEnabled(true)
                .isProductUpdateCommEnabled(true)
                .comments("Administrator User")
                .roles(AdminUsersRoleArgs.builder()
                    .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                    .build())
                .adminScopeType("LOCATION_GROUP")
                .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
                    .ids(corporateUserTrafficGroup.applyValue(getLocationGroupsResult -> getLocationGroupsResult.id()))
                    .build())
                .build());
    
        }
    }
    
    resources:
      ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
      johnSmith:
        type: zia:AdminUsers
        properties:
          loginName: john.smith@acme.com
          userName: John Smith
          email: john.smith@acme.com
          isPasswordLoginAllowed: true
          password: '*********************'
          isSecurityReportCommEnabled: true
          isServiceUpdateCommEnabled: true
          isProductUpdateCommEnabled: true
          comments: Administrator User
          roles:
            - id: ${superAdmin.id}
          adminScopeType: LOCATION_GROUP
          adminScopeEntities:
            ids:
              - ${corporateUserTrafficGroup.id}
    variables:
      superAdmin:
        fn::invoke:
          Function: zia:getAdminRoles
          Arguments:
            name: Super Admin
      corporateUserTrafficGroup:
        fn::invoke:
          Function: zia:getLocationGroups
          Arguments:
            name: Corporate User Traffic Group
    

    Create AdminUsers Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new AdminUsers(name: string, args: AdminUsersArgs, opts?: CustomResourceOptions);
    @overload
    def AdminUsers(resource_name: str,
                   args: AdminUsersArgs,
                   opts: Optional[ResourceOptions] = None)
    
    @overload
    def AdminUsers(resource_name: str,
                   opts: Optional[ResourceOptions] = None,
                   email: Optional[str] = None,
                   username: Optional[str] = None,
                   login_name: Optional[str] = None,
                   is_password_expired: Optional[bool] = None,
                   is_product_update_comm_enabled: Optional[bool] = None,
                   is_auditor: Optional[bool] = None,
                   is_exec_mobile_app_enabled: Optional[bool] = None,
                   is_non_editable: Optional[bool] = None,
                   admin_scope_entities: Optional[AdminUsersAdminScopeEntitiesArgs] = None,
                   is_password_login_allowed: Optional[bool] = None,
                   disabled: Optional[bool] = None,
                   is_security_report_comm_enabled: Optional[bool] = None,
                   is_service_update_comm_enabled: Optional[bool] = None,
                   comments: Optional[str] = None,
                   password: Optional[str] = None,
                   roles: Optional[Sequence[AdminUsersRoleArgs]] = None,
                   admin_scope_type: Optional[str] = None)
    func NewAdminUsers(ctx *Context, name string, args AdminUsersArgs, opts ...ResourceOption) (*AdminUsers, error)
    public AdminUsers(string name, AdminUsersArgs args, CustomResourceOptions? opts = null)
    public AdminUsers(String name, AdminUsersArgs args)
    public AdminUsers(String name, AdminUsersArgs args, CustomResourceOptions options)
    
    type: zia:AdminUsers
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args AdminUsersArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args AdminUsersArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args AdminUsersArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args AdminUsersArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args AdminUsersArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var adminUsersResource = new Zia.AdminUsers("adminUsersResource", new()
    {
        Email = "string",
        Username = "string",
        LoginName = "string",
        IsPasswordExpired = false,
        IsProductUpdateCommEnabled = false,
        IsAuditor = false,
        IsExecMobileAppEnabled = false,
        IsNonEditable = false,
        AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        IsPasswordLoginAllowed = false,
        Disabled = false,
        IsSecurityReportCommEnabled = false,
        IsServiceUpdateCommEnabled = false,
        Comments = "string",
        Password = "string",
        Roles = new[]
        {
            new Zia.Inputs.AdminUsersRoleArgs
            {
                Id = 0,
            },
        },
        AdminScopeType = "string",
    });
    
    example, err := zia.NewAdminUsers(ctx, "adminUsersResource", &zia.AdminUsersArgs{
    	Email:                      pulumi.String("string"),
    	Username:                   pulumi.String("string"),
    	LoginName:                  pulumi.String("string"),
    	IsPasswordExpired:          pulumi.Bool(false),
    	IsProductUpdateCommEnabled: pulumi.Bool(false),
    	IsAuditor:                  pulumi.Bool(false),
    	IsExecMobileAppEnabled:     pulumi.Bool(false),
    	IsNonEditable:              pulumi.Bool(false),
    	AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	IsPasswordLoginAllowed:      pulumi.Bool(false),
    	Disabled:                    pulumi.Bool(false),
    	IsSecurityReportCommEnabled: pulumi.Bool(false),
    	IsServiceUpdateCommEnabled:  pulumi.Bool(false),
    	Comments:                    pulumi.String("string"),
    	Password:                    pulumi.String("string"),
    	Roles: zia.AdminUsersRoleArray{
    		&zia.AdminUsersRoleArgs{
    			Id: pulumi.Int(0),
    		},
    	},
    	AdminScopeType: pulumi.String("string"),
    })
    
    var adminUsersResource = new AdminUsers("adminUsersResource", AdminUsersArgs.builder()
        .email("string")
        .username("string")
        .loginName("string")
        .isPasswordExpired(false)
        .isProductUpdateCommEnabled(false)
        .isAuditor(false)
        .isExecMobileAppEnabled(false)
        .isNonEditable(false)
        .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
            .ids(0)
            .build())
        .isPasswordLoginAllowed(false)
        .disabled(false)
        .isSecurityReportCommEnabled(false)
        .isServiceUpdateCommEnabled(false)
        .comments("string")
        .password("string")
        .roles(AdminUsersRoleArgs.builder()
            .id(0)
            .build())
        .adminScopeType("string")
        .build());
    
    admin_users_resource = zia.AdminUsers("adminUsersResource",
        email="string",
        username="string",
        login_name="string",
        is_password_expired=False,
        is_product_update_comm_enabled=False,
        is_auditor=False,
        is_exec_mobile_app_enabled=False,
        is_non_editable=False,
        admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
            ids=[0],
        ),
        is_password_login_allowed=False,
        disabled=False,
        is_security_report_comm_enabled=False,
        is_service_update_comm_enabled=False,
        comments="string",
        password="string",
        roles=[zia.AdminUsersRoleArgs(
            id=0,
        )],
        admin_scope_type="string")
    
    const adminUsersResource = new zia.AdminUsers("adminUsersResource", {
        email: "string",
        username: "string",
        loginName: "string",
        isPasswordExpired: false,
        isProductUpdateCommEnabled: false,
        isAuditor: false,
        isExecMobileAppEnabled: false,
        isNonEditable: false,
        adminScopeEntities: {
            ids: [0],
        },
        isPasswordLoginAllowed: false,
        disabled: false,
        isSecurityReportCommEnabled: false,
        isServiceUpdateCommEnabled: false,
        comments: "string",
        password: "string",
        roles: [{
            id: 0,
        }],
        adminScopeType: "string",
    });
    
    type: zia:AdminUsers
    properties:
        adminScopeEntities:
            ids:
                - 0
        adminScopeType: string
        comments: string
        disabled: false
        email: string
        isAuditor: false
        isExecMobileAppEnabled: false
        isNonEditable: false
        isPasswordExpired: false
        isPasswordLoginAllowed: false
        isProductUpdateCommEnabled: false
        isSecurityReportCommEnabled: false
        isServiceUpdateCommEnabled: false
        loginName: string
        password: string
        roles:
            - id: 0
        username: string
    

    AdminUsers Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The AdminUsers resource accepts the following input properties:

    Email string
    Admin or auditor's email address.
    LoginName string
    Username string
    Admin or auditor's username.
    AdminScopeEntities zscaler.PulumiPackage.Zia.Inputs.AdminUsersAdminScopeEntities
    list of destination ip groups
    AdminScopeType string
    Comments string
    Additional information about the admin or auditor.
    Disabled bool
    IsAuditor bool
    IsExecMobileAppEnabled bool
    IsNonEditable bool
    IsPasswordExpired bool
    IsPasswordLoginAllowed bool
    IsProductUpdateCommEnabled bool
    IsSecurityReportCommEnabled bool
    IsServiceUpdateCommEnabled bool
    Password string
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    Roles List<zscaler.PulumiPackage.Zia.Inputs.AdminUsersRole>
    Role of the admin. This is not required for an auditor.
    Email string
    Admin or auditor's email address.
    LoginName string
    Username string
    Admin or auditor's username.
    AdminScopeEntities AdminUsersAdminScopeEntitiesArgs
    list of destination ip groups
    AdminScopeType string
    Comments string
    Additional information about the admin or auditor.
    Disabled bool
    IsAuditor bool
    IsExecMobileAppEnabled bool
    IsNonEditable bool
    IsPasswordExpired bool
    IsPasswordLoginAllowed bool
    IsProductUpdateCommEnabled bool
    IsSecurityReportCommEnabled bool
    IsServiceUpdateCommEnabled bool
    Password string
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    Roles []AdminUsersRoleArgs
    Role of the admin. This is not required for an auditor.
    email String
    Admin or auditor's email address.
    loginName String
    username String
    Admin or auditor's username.
    adminScopeEntities AdminUsersAdminScopeEntities
    list of destination ip groups
    adminScopeType String
    comments String
    Additional information about the admin or auditor.
    disabled Boolean
    isAuditor Boolean
    isExecMobileAppEnabled Boolean
    isNonEditable Boolean
    isPasswordExpired Boolean
    isPasswordLoginAllowed Boolean
    isProductUpdateCommEnabled Boolean
    isSecurityReportCommEnabled Boolean
    isServiceUpdateCommEnabled Boolean
    password String
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    roles List<AdminUsersRole>
    Role of the admin. This is not required for an auditor.
    email string
    Admin or auditor's email address.
    loginName string
    username string
    Admin or auditor's username.
    adminScopeEntities AdminUsersAdminScopeEntities
    list of destination ip groups
    adminScopeType string
    comments string
    Additional information about the admin or auditor.
    disabled boolean
    isAuditor boolean
    isExecMobileAppEnabled boolean
    isNonEditable boolean
    isPasswordExpired boolean
    isPasswordLoginAllowed boolean
    isProductUpdateCommEnabled boolean
    isSecurityReportCommEnabled boolean
    isServiceUpdateCommEnabled boolean
    password string
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    roles AdminUsersRole[]
    Role of the admin. This is not required for an auditor.
    email str
    Admin or auditor's email address.
    login_name str
    username str
    Admin or auditor's username.
    admin_scope_entities AdminUsersAdminScopeEntitiesArgs
    list of destination ip groups
    admin_scope_type str
    comments str
    Additional information about the admin or auditor.
    disabled bool
    is_auditor bool
    is_exec_mobile_app_enabled bool
    is_non_editable bool
    is_password_expired bool
    is_password_login_allowed bool
    is_product_update_comm_enabled bool
    is_security_report_comm_enabled bool
    is_service_update_comm_enabled bool
    password str
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    roles Sequence[AdminUsersRoleArgs]
    Role of the admin. This is not required for an auditor.
    email String
    Admin or auditor's email address.
    loginName String
    username String
    Admin or auditor's username.
    adminScopeEntities Property Map
    list of destination ip groups
    adminScopeType String
    comments String
    Additional information about the admin or auditor.
    disabled Boolean
    isAuditor Boolean
    isExecMobileAppEnabled Boolean
    isNonEditable Boolean
    isPasswordExpired Boolean
    isPasswordLoginAllowed Boolean
    isProductUpdateCommEnabled Boolean
    isSecurityReportCommEnabled Boolean
    isServiceUpdateCommEnabled Boolean
    password String
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    roles List<Property Map>
    Role of the admin. This is not required for an auditor.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the AdminUsers resource produces the following output properties:

    AdminId int
    Id string
    The provider-assigned unique ID for this managed resource.
    AdminId int
    Id string
    The provider-assigned unique ID for this managed resource.
    adminId Integer
    id String
    The provider-assigned unique ID for this managed resource.
    adminId number
    id string
    The provider-assigned unique ID for this managed resource.
    admin_id int
    id str
    The provider-assigned unique ID for this managed resource.
    adminId Number
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing AdminUsers Resource

    Get an existing AdminUsers resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: AdminUsersState, opts?: CustomResourceOptions): AdminUsers
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            admin_id: Optional[int] = None,
            admin_scope_entities: Optional[AdminUsersAdminScopeEntitiesArgs] = None,
            admin_scope_type: Optional[str] = None,
            comments: Optional[str] = None,
            disabled: Optional[bool] = None,
            email: Optional[str] = None,
            is_auditor: Optional[bool] = None,
            is_exec_mobile_app_enabled: Optional[bool] = None,
            is_non_editable: Optional[bool] = None,
            is_password_expired: Optional[bool] = None,
            is_password_login_allowed: Optional[bool] = None,
            is_product_update_comm_enabled: Optional[bool] = None,
            is_security_report_comm_enabled: Optional[bool] = None,
            is_service_update_comm_enabled: Optional[bool] = None,
            login_name: Optional[str] = None,
            password: Optional[str] = None,
            roles: Optional[Sequence[AdminUsersRoleArgs]] = None,
            username: Optional[str] = None) -> AdminUsers
    func GetAdminUsers(ctx *Context, name string, id IDInput, state *AdminUsersState, opts ...ResourceOption) (*AdminUsers, error)
    public static AdminUsers Get(string name, Input<string> id, AdminUsersState? state, CustomResourceOptions? opts = null)
    public static AdminUsers get(String name, Output<String> id, AdminUsersState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AdminId int
    AdminScopeEntities zscaler.PulumiPackage.Zia.Inputs.AdminUsersAdminScopeEntities
    list of destination ip groups
    AdminScopeType string
    Comments string
    Additional information about the admin or auditor.
    Disabled bool
    Email string
    Admin or auditor's email address.
    IsAuditor bool
    IsExecMobileAppEnabled bool
    IsNonEditable bool
    IsPasswordExpired bool
    IsPasswordLoginAllowed bool
    IsProductUpdateCommEnabled bool
    IsSecurityReportCommEnabled bool
    IsServiceUpdateCommEnabled bool
    LoginName string
    Password string
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    Roles List<zscaler.PulumiPackage.Zia.Inputs.AdminUsersRole>
    Role of the admin. This is not required for an auditor.
    Username string
    Admin or auditor's username.
    AdminId int
    AdminScopeEntities AdminUsersAdminScopeEntitiesArgs
    list of destination ip groups
    AdminScopeType string
    Comments string
    Additional information about the admin or auditor.
    Disabled bool
    Email string
    Admin or auditor's email address.
    IsAuditor bool
    IsExecMobileAppEnabled bool
    IsNonEditable bool
    IsPasswordExpired bool
    IsPasswordLoginAllowed bool
    IsProductUpdateCommEnabled bool
    IsSecurityReportCommEnabled bool
    IsServiceUpdateCommEnabled bool
    LoginName string
    Password string
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    Roles []AdminUsersRoleArgs
    Role of the admin. This is not required for an auditor.
    Username string
    Admin or auditor's username.
    adminId Integer
    adminScopeEntities AdminUsersAdminScopeEntities
    list of destination ip groups
    adminScopeType String
    comments String
    Additional information about the admin or auditor.
    disabled Boolean
    email String
    Admin or auditor's email address.
    isAuditor Boolean
    isExecMobileAppEnabled Boolean
    isNonEditable Boolean
    isPasswordExpired Boolean
    isPasswordLoginAllowed Boolean
    isProductUpdateCommEnabled Boolean
    isSecurityReportCommEnabled Boolean
    isServiceUpdateCommEnabled Boolean
    loginName String
    password String
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    roles List<AdminUsersRole>
    Role of the admin. This is not required for an auditor.
    username String
    Admin or auditor's username.
    adminId number
    adminScopeEntities AdminUsersAdminScopeEntities
    list of destination ip groups
    adminScopeType string
    comments string
    Additional information about the admin or auditor.
    disabled boolean
    email string
    Admin or auditor's email address.
    isAuditor boolean
    isExecMobileAppEnabled boolean
    isNonEditable boolean
    isPasswordExpired boolean
    isPasswordLoginAllowed boolean
    isProductUpdateCommEnabled boolean
    isSecurityReportCommEnabled boolean
    isServiceUpdateCommEnabled boolean
    loginName string
    password string
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    roles AdminUsersRole[]
    Role of the admin. This is not required for an auditor.
    username string
    Admin or auditor's username.
    admin_id int
    admin_scope_entities AdminUsersAdminScopeEntitiesArgs
    list of destination ip groups
    admin_scope_type str
    comments str
    Additional information about the admin or auditor.
    disabled bool
    email str
    Admin or auditor's email address.
    is_auditor bool
    is_exec_mobile_app_enabled bool
    is_non_editable bool
    is_password_expired bool
    is_password_login_allowed bool
    is_product_update_comm_enabled bool
    is_security_report_comm_enabled bool
    is_service_update_comm_enabled bool
    login_name str
    password str
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    roles Sequence[AdminUsersRoleArgs]
    Role of the admin. This is not required for an auditor.
    username str
    Admin or auditor's username.
    adminId Number
    adminScopeEntities Property Map
    list of destination ip groups
    adminScopeType String
    comments String
    Additional information about the admin or auditor.
    disabled Boolean
    email String
    Admin or auditor's email address.
    isAuditor Boolean
    isExecMobileAppEnabled Boolean
    isNonEditable Boolean
    isPasswordExpired Boolean
    isPasswordLoginAllowed Boolean
    isProductUpdateCommEnabled Boolean
    isSecurityReportCommEnabled Boolean
    isServiceUpdateCommEnabled Boolean
    loginName String
    password String
    The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
    roles List<Property Map>
    Role of the admin. This is not required for an auditor.
    username String
    Admin or auditor's username.

    Supporting Types

    AdminUsersAdminScopeEntities, AdminUsersAdminScopeEntitiesArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    AdminUsersRole, AdminUsersRoleArgs

    Id int
    Id int
    id Integer
    id number
    id int
    id Number

    Import

    Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.

    Visit

    zia_admin_users can be imported by using <ADMIN ID> or <LOGIN NAME> as the import ID.

    For example:

    $ pulumi import zia:index/adminUsers:AdminUsers example <admin_id>
    

    or

    $ pulumi import zia:index/adminUsers:AdminUsers example <login_name>
    

    ⚠️ NOTE :: This provider do not import the password attribute value during the importing process.

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    zia zscaler/pulumi-zia
    License
    MIT
    Notes
    This Pulumi package is based on the zia Terraform Provider.
    zia logo
    Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler